SlideShare a Scribd company logo
1 of 30
Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
• Ethernet Cabling
• Manchester Encoding
• The Ethernet MAC Sublayer Protocol
• The Binary Exponential Backoff Algorithm
• Ethernet Performance
• Switched Ethernet
• Fast Ethernet
• Gigabit Ethernet
• IEEE 802.2: Logical Link Control
• Retrospective on Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Cabling
• Finished our general discussion of channel allocation
protocols
• It is time to see how these principles apply to real
systems, in particular, LANs
• IEEE has standardized a number of local area networks
and metropolitan area networks under the name of
IEEE 802
• The most important of the survivors are 802.3
(Ethernet) and 802.11 (wireless LAN)
• With 802.15 (Bluetooth) and 802.16 (wireless MAN)
• Ethernet, the protocols and recent developments in
highspeed (gigabit) Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Cabling
• ''Ethernet'' refers to the cable (the ether)
• Four types of cabling are commonly used, as
shown in Fig
Dr.T.Thendral, Assistant Professor, SRCW
• Detecting cable breaks, excessive length, bad taps, or loose
connectors can be a major problem with this media
• For this reason, techniques have been developed to track them
down
• Basically, a pulse of known shape is injected into the cable
• If the pulse hits an obstacle or the end of the cable, an echo will be
generated and sent back
• By carefully timing the interval between sending the pulse and
receiving the echo, it is possible to localize the origin of the echo
• This technique is called time domain reflectometry
• The problems associated with finding cable breaks drove systems
toward a different kind of wiring pattern, in which all stations have
a cable running to a central hub in which they are all connected
electrically
Dr.T.Thendral, Assistant Professor, SRCW
• Three wiring schemes are illustrated in Fig
Dr.T.Thendral, Assistant Professor, SRCW
• For 10Base5, a transceiver is clamped securely
around the cable so that its tap makes contact
with the inner core
• The transceiver contains the electronics that
handle carrier detection and collision detection
• When a collision is detected, the transceiver also
puts a special invalid signal on the cable to ensure
that all other transceivers also realize that a
collision has occurred
Dr.T.Thendral, Assistant Professor, SRCW
• 10Base5: a transceiver cable or drop cable
connects the transceiver to an interface board in
the computer
• The interface board contains a controller chip
that transmits frames to, and receives frames
from, the transceiver.
• 10Base2: The connection to the cable is just a
passive BNC T-junction connector
• The transceiver electronics are on the controller
board, and each station always has its own
transceiver.
Dr.T.Thendral, Assistant Professor, SRCW
• 10Base-T: There is no shared cable at all, just the
hub (a box full of electronics) to which each
station is connected by a dedicated (i.e., not
shared) cable
• A fourth cabling option for Ethernet is 10Base-F,
which uses fiber optics
• This alternative is expensive due to the cost of
the connectors and terminators, but it has
excellent noise immunity and is the method of
choice when running between buildings
Dr.T.Thendral, Assistant Professor, SRCW
• A repeater is a physical layer device
• It receives, amplifies (regenerates), and retransmits signals in both
directions
• As far as the software is concerned, a series of cable segments
connected by repeaters is no different from a single cable (except
for some delay introduced by the repeaters)
Dr.T.Thendral, Assistant Professor, SRCW
Manchester Encoding
• None of the versions of Ethernet uses straight binary encoding
with 0 volts for a 0 bit and 5 volts for a 1 bit because it leads to
ambiguities
• The start, end, or middle of each bit without reference to an
external clock
• Two such approaches are called Manchester encoding and
differential Manchester encoding
• With Manchester encoding, each bit period is divided into two
equal intervals
• A binary 1 bit is sent by having the voltage set high during
the first interval and low in the second one
• A binary 0 is just the reverse: first low and then high
Dr.T.Thendral, Assistant Professor, SRCW
Manchester encoding is shown in Fig. 4-16(b)
Differential Manchester encoding, shown in Fig. 4-16(c), is a variation of basic
Manchester encoding
Dr.T.Thendral, Assistant Professor, SRCW
The Ethernet MAC Sublayer Protocol
• The original DIX (DEC, Intel, Xerox) frame
structure is shown in Fig
• Each frame starts with a Preamble of 8 bytes
• The frame contains two addresses, one for the
destination and one for the source
• When a frame is sent to a group address, all the
stations in the group receive it
• Sending to a group of stations is called multicast
• The address consisting of all 1 bits is reserved for
broadcast
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
• Station tries to transmit a very short frame, it is conceivable that
a collision occurs, but the transmission completes before the
noise burst gets back at 2τ
• The sender will then incorrectly conclude that the frame was
successfully sent
• To prevent this situation from occurring, all frames must take
more than 2τ to send so that the transmission is still taking place
when the noise burst gets back to the sender.
Dr.T.Thendral, Assistant Professor, SRCW
• The final Ethernet field is the Checksum
• It is effectively a 32-bit hash code of the data
• If some data bits are erroneously received (due to
noise on the cable), the checksum will almost
certainly be wrong and the error will be detected
• The checksum algorithm is a cyclic redundancy check
(CRC)
• It just does error detection, not forward error
correction
Dr.T.Thendral, Assistant Professor, SRCW
The Binary Exponential Backoff Algorithm
• In general, after i collisions, a random number between 0 and
2i
• - 1 is chosen, and that number of slots is skipped
• However, after ten collisions have been reached, the
randomization interval is frozen at a maximum of 1023 slots
• After 16 collisions, the controller throws in the towel and
reports failure back to the computer
• Further recovery is up to higher layers
• This algorithm, called binary exponential backoff
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Performance
• The performance of Ethernet under conditions of heavy and
constant load, that is, k stations always ready to transmit
• A rigorous analysis of the binary exponential backoff
algorithm is complicated
• Instead, we will follow Metcalfe and Boggs (1976) and
assume a constant retransmission probability in each slot
• The channel efficiency is plotted versus number of ready
stations
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
Switched Ethernet
• The heart of this system is a switch containing a high-
speed backplane and room for typically 4 to 32 plug-
in line cards, each containing one to eight connectors
• Most often, each connector has a 10Base-T twisted
pair connection to a single host computer
Dr.T.Thendral, Assistant Professor, SRCW
Figure 4-20. A simple example of switched Ethernet.
Dr.T.Thendral, Assistant Professor, SRCW
Fast Ethernet
• To pump up the speed, various industry groups
proposed two new ring-based optical LANs
• One was called FDDI (Fiber Distributed Data
Interface) and the other was called Fibre Channel
• In any event, the failure of the optical LANs to
catch fire left a gap for garden-variety
• Ethernet at speeds above 10 Mbps
• Many installations needed more bandwidth and
thus had numerous 10-Mbps LANs connected by
a maze of repeaters, bridges, routers, and
gateways
Dr.T.Thendral, Assistant Professor, SRCW
• The 802.3 committee decided to go with a
souped-up Ethernet for three primary reasons:
• 1. The need to be backward compatible with
existing Ethernet LANs.
• 2. The fear that a new protocol might have
unforeseen problems.
• 3. The desire to get the job done before the
technology changed
Dr.T.Thendral, Assistant Professor, SRCW
Gigabit Ethernet
• Fast Ethernet standard when the 802
committee began working on a yet faster
Ethernet (1995)
• It was quickly dubbed gigabit Ethernet and
was ratified by IEEE in 1998 under the name
802.3z
Dr.T.Thendral, Assistant Professor, SRCW
• In the simplest gigabit Ethernet configuration, illustrated in
Fig. 4-22(a), two computers are directly connected to each
other
• common case, having a switch or a hub connected to multiple
computers
• and possibly additional switches or hubs, as shown in Fig. 4-
22(b)
• In both configurations each individual Ethernet cable has
exactly two devices on it, no more and no fewer
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
• Gigabit Ethernet uses new encoding rules on the
fibers
• The following two rules were used in making the
choices:
• 1. No codeword may have more than four identical
bits in a row.
• 2. No codeword may have more than six 0s or six 1s.
Dr.T.Thendral, Assistant Professor, SRCW
• There are also systems in which an error-
controlled, flow-controlled data link protocol
is desired
• IEEE has defined one that can run on top of
Ethernet and the other 802 protocols
• In addition, this protocol, called LLC (Logical
Link Control)
Dr.T.Thendral, Assistant Professor, SRCW
• LLC forms the upper half of the data link layer, with the
MAC sublayer below it, as shown in Fig
• Typical usage of LLC is as follows
• The network layer on the sending machine passes a packet to
LLC, using the LLC access primitives
• The LLC sublayer then adds an LLC header, containing
sequence and acknowledgement numbers
Dr.T.Thendral, Assistant Professor, SRCW
Retrospective on Ethernet
• Ethernet has been around for over 20 years and has
no serious competitors in sight, so it is likely to be
around for many years to come
• Few CPU architectures, operating systems, or
programming languages have been king of the
mountain for two decades going on three
• the main reason for it that Ethernet is simple and
flexible
• Ethernet has been able to evolve in certain crucial
ways
Dr.T.Thendral, Assistant Professor, SRCW

More Related Content

Similar to Ethernet.ppt

Computer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptxComputer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptxnajed76732
 
A427 nic card
A427 nic cardA427 nic card
A427 nic cardsurajbhai
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptxmmmm11111
 
Lan basic
Lan basicLan basic
Lan basicOnline
 
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptxtendaisigauke3
 
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolPradnya Saval
 
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Pradnya Saval
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsTutun Juhana
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansLiving Online
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfSujanTimalsina5
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBdhanashrisabale1
 
Networking Chapter 4
Networking Chapter 4Networking Chapter 4
Networking Chapter 4mlrbrown
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATMMadhumita Tamhane
 

Similar to Ethernet.ppt (20)

Computer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptxComputer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptx
 
lecture01_tm.pptx
lecture01_tm.pptxlecture01_tm.pptx
lecture01_tm.pptx
 
A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
 
Lan basic
Lan basicLan basic
Lan basic
 
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
 
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
 
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdf
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
 
Chapter 1 ppt by dmb
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
 
Networking HMT-1
Networking HMT-1Networking HMT-1
Networking HMT-1
 
Wireless LANs PPT.ppt
Wireless LANs PPT.pptWireless LANs PPT.ppt
Wireless LANs PPT.ppt
 
Railway ofc training
Railway ofc trainingRailway ofc training
Railway ofc training
 
Networking Chapter 4
Networking Chapter 4Networking Chapter 4
Networking Chapter 4
 
osi
osi osi
osi
 
Ieee 802 standard
Ieee 802 standardIeee 802 standard
Ieee 802 standard
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATM
 

More from DrTThendralCompSci

SOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.pptDrTThendralCompSci
 
Software Configuration Management.ppt
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.pptDrTThendralCompSci
 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptxDrTThendralCompSci
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptDrTThendralCompSci
 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptxDrTThendralCompSci
 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptDrTThendralCompSci
 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptDrTThendralCompSci
 

More from DrTThendralCompSci (20)

Loader and linker.pptx
Loader and linker.pptxLoader and linker.pptx
Loader and linker.pptx
 
The Application Layer.ppt
The Application Layer.pptThe Application Layer.ppt
The Application Layer.ppt
 
Transport Layer.pptx
Transport Layer.pptxTransport Layer.pptx
Transport Layer.pptx
 
SOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.ppt
 
Software Configuration Management.ppt
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.ppt
 
UNIT TESTING.pptx
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptx
 
SOFTWARE TESTING.pptx
SOFTWARE TESTING.pptxSOFTWARE TESTING.pptx
SOFTWARE TESTING.pptx
 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
 
NETWORK LAYER.ppt
NETWORK LAYER.pptNETWORK LAYER.ppt
NETWORK LAYER.ppt
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
 
Software prototyping.pptx
Software prototyping.pptxSoftware prototyping.pptx
Software prototyping.pptx
 
Requirement Engineering.ppt
Requirement Engineering.pptRequirement Engineering.ppt
Requirement Engineering.ppt
 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
 
EFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptxEFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptx
 
UNIT I.ppt
UNIT I.pptUNIT I.ppt
UNIT I.ppt
 
PHYSICAL LAYER.ppt
PHYSICAL LAYER.pptPHYSICAL LAYER.ppt
PHYSICAL LAYER.ppt
 
PROCESS MODELS.ppt
PROCESS MODELS.pptPROCESS MODELS.ppt
PROCESS MODELS.ppt
 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Ethernet.ppt

  • 2. • Ethernet Cabling • Manchester Encoding • The Ethernet MAC Sublayer Protocol • The Binary Exponential Backoff Algorithm • Ethernet Performance • Switched Ethernet • Fast Ethernet • Gigabit Ethernet • IEEE 802.2: Logical Link Control • Retrospective on Ethernet Dr.T.Thendral, Assistant Professor, SRCW
  • 3. Ethernet Cabling • Finished our general discussion of channel allocation protocols • It is time to see how these principles apply to real systems, in particular, LANs • IEEE has standardized a number of local area networks and metropolitan area networks under the name of IEEE 802 • The most important of the survivors are 802.3 (Ethernet) and 802.11 (wireless LAN) • With 802.15 (Bluetooth) and 802.16 (wireless MAN) • Ethernet, the protocols and recent developments in highspeed (gigabit) Ethernet Dr.T.Thendral, Assistant Professor, SRCW
  • 4. Ethernet Cabling • ''Ethernet'' refers to the cable (the ether) • Four types of cabling are commonly used, as shown in Fig Dr.T.Thendral, Assistant Professor, SRCW
  • 5. • Detecting cable breaks, excessive length, bad taps, or loose connectors can be a major problem with this media • For this reason, techniques have been developed to track them down • Basically, a pulse of known shape is injected into the cable • If the pulse hits an obstacle or the end of the cable, an echo will be generated and sent back • By carefully timing the interval between sending the pulse and receiving the echo, it is possible to localize the origin of the echo • This technique is called time domain reflectometry • The problems associated with finding cable breaks drove systems toward a different kind of wiring pattern, in which all stations have a cable running to a central hub in which they are all connected electrically Dr.T.Thendral, Assistant Professor, SRCW
  • 6. • Three wiring schemes are illustrated in Fig Dr.T.Thendral, Assistant Professor, SRCW
  • 7. • For 10Base5, a transceiver is clamped securely around the cable so that its tap makes contact with the inner core • The transceiver contains the electronics that handle carrier detection and collision detection • When a collision is detected, the transceiver also puts a special invalid signal on the cable to ensure that all other transceivers also realize that a collision has occurred Dr.T.Thendral, Assistant Professor, SRCW
  • 8. • 10Base5: a transceiver cable or drop cable connects the transceiver to an interface board in the computer • The interface board contains a controller chip that transmits frames to, and receives frames from, the transceiver. • 10Base2: The connection to the cable is just a passive BNC T-junction connector • The transceiver electronics are on the controller board, and each station always has its own transceiver. Dr.T.Thendral, Assistant Professor, SRCW
  • 9. • 10Base-T: There is no shared cable at all, just the hub (a box full of electronics) to which each station is connected by a dedicated (i.e., not shared) cable • A fourth cabling option for Ethernet is 10Base-F, which uses fiber optics • This alternative is expensive due to the cost of the connectors and terminators, but it has excellent noise immunity and is the method of choice when running between buildings Dr.T.Thendral, Assistant Professor, SRCW
  • 10. • A repeater is a physical layer device • It receives, amplifies (regenerates), and retransmits signals in both directions • As far as the software is concerned, a series of cable segments connected by repeaters is no different from a single cable (except for some delay introduced by the repeaters) Dr.T.Thendral, Assistant Professor, SRCW
  • 11. Manchester Encoding • None of the versions of Ethernet uses straight binary encoding with 0 volts for a 0 bit and 5 volts for a 1 bit because it leads to ambiguities • The start, end, or middle of each bit without reference to an external clock • Two such approaches are called Manchester encoding and differential Manchester encoding • With Manchester encoding, each bit period is divided into two equal intervals • A binary 1 bit is sent by having the voltage set high during the first interval and low in the second one • A binary 0 is just the reverse: first low and then high Dr.T.Thendral, Assistant Professor, SRCW
  • 12. Manchester encoding is shown in Fig. 4-16(b) Differential Manchester encoding, shown in Fig. 4-16(c), is a variation of basic Manchester encoding Dr.T.Thendral, Assistant Professor, SRCW
  • 13. The Ethernet MAC Sublayer Protocol • The original DIX (DEC, Intel, Xerox) frame structure is shown in Fig • Each frame starts with a Preamble of 8 bytes • The frame contains two addresses, one for the destination and one for the source • When a frame is sent to a group address, all the stations in the group receive it • Sending to a group of stations is called multicast • The address consisting of all 1 bits is reserved for broadcast Dr.T.Thendral, Assistant Professor, SRCW
  • 15. • Station tries to transmit a very short frame, it is conceivable that a collision occurs, but the transmission completes before the noise burst gets back at 2τ • The sender will then incorrectly conclude that the frame was successfully sent • To prevent this situation from occurring, all frames must take more than 2τ to send so that the transmission is still taking place when the noise burst gets back to the sender. Dr.T.Thendral, Assistant Professor, SRCW
  • 16. • The final Ethernet field is the Checksum • It is effectively a 32-bit hash code of the data • If some data bits are erroneously received (due to noise on the cable), the checksum will almost certainly be wrong and the error will be detected • The checksum algorithm is a cyclic redundancy check (CRC) • It just does error detection, not forward error correction Dr.T.Thendral, Assistant Professor, SRCW
  • 17. The Binary Exponential Backoff Algorithm • In general, after i collisions, a random number between 0 and 2i • - 1 is chosen, and that number of slots is skipped • However, after ten collisions have been reached, the randomization interval is frozen at a maximum of 1023 slots • After 16 collisions, the controller throws in the towel and reports failure back to the computer • Further recovery is up to higher layers • This algorithm, called binary exponential backoff Dr.T.Thendral, Assistant Professor, SRCW
  • 18. Ethernet Performance • The performance of Ethernet under conditions of heavy and constant load, that is, k stations always ready to transmit • A rigorous analysis of the binary exponential backoff algorithm is complicated • Instead, we will follow Metcalfe and Boggs (1976) and assume a constant retransmission probability in each slot • The channel efficiency is plotted versus number of ready stations Dr.T.Thendral, Assistant Professor, SRCW
  • 20. Switched Ethernet • The heart of this system is a switch containing a high- speed backplane and room for typically 4 to 32 plug- in line cards, each containing one to eight connectors • Most often, each connector has a 10Base-T twisted pair connection to a single host computer Dr.T.Thendral, Assistant Professor, SRCW
  • 21. Figure 4-20. A simple example of switched Ethernet. Dr.T.Thendral, Assistant Professor, SRCW
  • 22. Fast Ethernet • To pump up the speed, various industry groups proposed two new ring-based optical LANs • One was called FDDI (Fiber Distributed Data Interface) and the other was called Fibre Channel • In any event, the failure of the optical LANs to catch fire left a gap for garden-variety • Ethernet at speeds above 10 Mbps • Many installations needed more bandwidth and thus had numerous 10-Mbps LANs connected by a maze of repeaters, bridges, routers, and gateways Dr.T.Thendral, Assistant Professor, SRCW
  • 23. • The 802.3 committee decided to go with a souped-up Ethernet for three primary reasons: • 1. The need to be backward compatible with existing Ethernet LANs. • 2. The fear that a new protocol might have unforeseen problems. • 3. The desire to get the job done before the technology changed Dr.T.Thendral, Assistant Professor, SRCW
  • 24. Gigabit Ethernet • Fast Ethernet standard when the 802 committee began working on a yet faster Ethernet (1995) • It was quickly dubbed gigabit Ethernet and was ratified by IEEE in 1998 under the name 802.3z Dr.T.Thendral, Assistant Professor, SRCW
  • 25. • In the simplest gigabit Ethernet configuration, illustrated in Fig. 4-22(a), two computers are directly connected to each other • common case, having a switch or a hub connected to multiple computers • and possibly additional switches or hubs, as shown in Fig. 4- 22(b) • In both configurations each individual Ethernet cable has exactly two devices on it, no more and no fewer Dr.T.Thendral, Assistant Professor, SRCW
  • 27. • Gigabit Ethernet uses new encoding rules on the fibers • The following two rules were used in making the choices: • 1. No codeword may have more than four identical bits in a row. • 2. No codeword may have more than six 0s or six 1s. Dr.T.Thendral, Assistant Professor, SRCW
  • 28. • There are also systems in which an error- controlled, flow-controlled data link protocol is desired • IEEE has defined one that can run on top of Ethernet and the other 802 protocols • In addition, this protocol, called LLC (Logical Link Control) Dr.T.Thendral, Assistant Professor, SRCW
  • 29. • LLC forms the upper half of the data link layer, with the MAC sublayer below it, as shown in Fig • Typical usage of LLC is as follows • The network layer on the sending machine passes a packet to LLC, using the LLC access primitives • The LLC sublayer then adds an LLC header, containing sequence and acknowledgement numbers Dr.T.Thendral, Assistant Professor, SRCW
  • 30. Retrospective on Ethernet • Ethernet has been around for over 20 years and has no serious competitors in sight, so it is likely to be around for many years to come • Few CPU architectures, operating systems, or programming languages have been king of the mountain for two decades going on three • the main reason for it that Ethernet is simple and flexible • Ethernet has been able to evolve in certain crucial ways Dr.T.Thendral, Assistant Professor, SRCW